header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Quest NetVault Backup Server < 11.4.5 Process Manager Service SQL Injection Remote Code Execution Vulnerability (ZDI-17-982)

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Quest NetVault Backup. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of NVBUPhaseStatus Acknowledge method requests. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the underlying database.

AirDrop 2.0 Remote Denial of Service (DoS)

This exploit allows an attacker to perform a denial of service attack on AirDrop 2.0. By sending a specially crafted packet, the attacker can cause the AirDrop service to crash, resulting in a denial of service for legitimate users. This vulnerability affects AirDrop versions 2.0 and below.

C4G Basic Laboratory Information System (BLIS) 3.4 – Multiples SQL Injection

This vulnerability allows unauthenticated remote attackers to execute arbitrary SQL commands and obtain private information. It affects the C4G Basic Laboratory Information System (BLIS) version 3.4. The vulnerability occurs in multiple occurrences within the system, specifically in the 'site' parameter of the 'users_select.php' page.

Memu Play 6.0.7 – Privilege Escalation (PoC)

Memu Play 6.0.7 suffers from Privilege Escalation due to insecure file permissions. By default, the Authenticated Users group has modify permission to ESM folders/files, allowing a low privilege account to rename the MemuService.exe file and replace it with a malicious file that can connect back to an attacking computer and gain system level privileges. Restarting the computer triggers the execution of the malicious file.

Recent Exploits: